Penetration Testing with KALI and More: All You Need to Know

Course

Online

£ 10 + VAT

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniques employed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced level. We will discuss various topics ranging from traditional to many modern ones, such as Networking security, Linux security, Web Applications structure and security, Mobile Applications architecture and security, Hardware security, and the hot topic of IoT security. At the end of the course, I will show you some real attacks.The layout of the course is easy to walk-through, and the videos are made short and engaging. My purpose is to present you with case exposition and show you live demos, while utilizing a large set of KALI tools (Enumeration, Scanning, Exploitation, Persistence Access, Reporting and Social Engineering tools) in order to get you started quickly. The necessary resources and tools are posted for each sections of the course.Before jumping into penetration testing, you will first learn how to set up your own lab and install the needed software to practice Penetration Testing along with me. All the attacks explained in this course are launched against real devices, and nothing is theoretical. The course will demonstrate how to fully control victims' devices such as servers, workstations, and mobile phones. The course can also be interesting to those looking for quick hacks such as controlling victim's camera, screen, mobile contacts, emails and SMS messages.At the end of the course you will be equipped with the necessary tools and skills to:Assess security risks by adopting a standard Threat Modeling technique
Adopt a structured approach to perform Penetration Tests
Protect yourself and the organization you work at
Compile security findings and present them professionally to your clients
Make the world a safer place

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Learn simplified ethical hacking techniques from scratch
Learn Linux basics
Learn more than 9 ways to perform LAN attacks
Master 2 smart techniques to crack into wireless networks
Perform an actual Mobile attack
Learn 10+ web application attacks
Learn more than 5 proven methods of Social Engineering attacks
Obtain 20+ skills any penetration tester needs to succeed
Make better decisions on how to protect your applications and network
Upgrade your information security skills for a new job or career change
Learn how to write a professional penetration testing report

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Emagister S.L. (data controller) will process your data to carry out promotional activities (via email and/or phone), publish reviews, or manage incidents. You can learn about your rights and manage your preferences in the privacy policy.

Reviews

This centre's achievements

2021

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Install
  • Web
  • Hacking
  • Installation
  • Server
  • Linux
  • Windows
  • Testing
  • Access

Course programme

Introduction 2 lectures 04:03 The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course Introduction to the course Introduction 2 lectures 04:03 The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course Introduction to the course The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course The Undeniable Power of Ethical Hacking Here you can find a file that has all the required links throughout this course Here you can find a file that has all the required links throughout this course Here you can find a file that has all the required links throughout this course Introduction to the course Introduction to the course Introduction to the course Introduction to the course Setup Your Lab 5 lectures 09:12 Why KALI Different Installation Methods Install KALI Install Windows (Target Machine) Color Coding for Root User Setup Your Lab 5 lectures 09:12 Why KALI Different Installation Methods Install KALI Install Windows (Target Machine) Color Coding for Root User Why KALI Why KALI Why KALI Why KALI Different Installation Methods Different Installation Methods Different Installation Methods Different Installation Methods Install KALI Install KALI Install KALI Install KALI Install Windows (Target Machine) Install Windows (Target Machine) Install Windows (Target Machine) Install Windows (Target Machine) Color Coding for Root User Color Coding for Root User Color Coding for Root User Color Coding for Root User Explore KALI 3 lectures 05:45 Master KALI Desktop Environment Tips and Tricks + Update, Upgrade, and Alias Commands Color Coding Explore KALI 3 lectures 05:45 Master KALI Desktop Environment Tips and Tricks + Update, Upgrade, and Alias Commands Color Coding Master KALI Desktop Environment Master KALI Desktop Environment Master KALI Desktop Environment Master KALI Desktop Environment Tips and Tricks + Update, Upgrade, and Alias Commands Tips and Tricks + Update, Upgrade, and Alias Commands Tips and Tricks + Update, Upgrade, and Alias Commands Tips and Tricks + Update, Upgrade, and Alias Commands Color Coding Color Coding Color Coding Color Coding Setup Your KALI Server 2 lectures 13:35 Get Started with Linux Commands Explore Main Services and Install Necessary Programs Setup Your KALI Server 2 lectures 13:35 Get Started with Linux Commands Explore Main Services and Install Necessary Programs Get Started with Linux Commands Get Started with Linux Commands Get Started with Linux Commands Get Started with Linux Commands Explore Main Services and Install Necessary Programs Explore Main Services and Install Necessary Programs Explore Main Services and Install Necessary Programs Explore Main Services and Install Necessary Programs Steps to Plan a Successful Penetration Test 1 lecture 05:32 Threat Modeling Steps to Plan a Successful Penetration Test 1 lecture 05:32 Threat Modeling Threat Modeling Threat Modeling Threat Modeling Threat Modeling 9+ Ways to Attack a Network 14 lectures 01:17:03 Wireshark Simplified How Does Port Scanning Work Introducing NMAP NMAP and ZENMAP Simplified Understand NETBIOS and SMB Attacks Execute Man-in-the-Middle Attacks Perform a DNS Spoofing Attack Identify a DNS Zone Transfer Vulnerability Plan DOS and DDOS Attacks All-in-one Metasploit Framework Transfer the Payload to a Windows Machine Create Your First Trojan and Infiltrate a Target Explore the Powerful Armitage Tool Hide a Payload in a JPEG Image 9+ Ways to Attack a Network Cross-Site Scripting (XSS) Vulnerabilities Insecure Deserialization Vulnerabilities Using Components with Known Vulnerabilities Insufficient Logging & Monitoring Vulnerabilities Additional Risks to Consider Discover Vulnerabilities in Websites Control Database Server with SQLMap Easily Hack a WordPress Site Intercept, Analyze, and Replay Web Traffic 4+ Ways to Attack a Web Application 18 lectures 01:04:41 Web Applications Security Overview Web Applications Attack Surface Metasploitable VM Injection Vulnerabilities Broken Authentication Vulnerabilities Sensitive Data Exposure Vulnerabilities XML External Entities (XXE) Vulnerabilities Broken Access Control Vulnerabilities Security Misconfiguration Vulnerabilities Cross-Site Scripting (XSS) Vulnerabilities Insecure Deserialization Vulnerabilities Using Components with Known Vulnerabilities Insufficient Logging & Monitoring Vulnerabilities Additional Risks to Consider Discover Vulnerabilities in Websites Control Database Server with SQLMap Easily Hack a WordPress Site Intercept, Analyze, and Replay Web Traffic Web Applications Security Overview Web Applications Security Overview Web Applications Security Overview Web Applications Security Overview Web Applications Attack Surface Web Applications Attack Surface Web Applications Attack Surface Web Applications Attack Surface Metasploitable VM Metasploitable VM Metasploitable VM Metasploitable VM Injection Vulnerabilities Injection Vulnerabilities ...

Additional information

Intermediate computer knowledge Fair knowledge of Windows systems Networking basics Programming basics Web applications basics Mobile applications basics General idea about information security

Penetration Testing with KALI and More: All You Need to Know

£ 10 + VAT